News Archive

Blog

Oracle and Salesforce.com announce partnership

Oracle and Saleforce.com CEOs, Larry Ellison and Marc Benioff, hosted a briefing call on June 27th to announce a partnership between these two highly successful companies.  What does this partnership cover and what does it mean? Salesforce.com is built on Oracle technology and so Salesforce is very dependent upon Oracle.  Marc Benioff confirmed that Salesforce has confidence in the latest releases from Oracle including Oracle 12C database, Oracle Linux and Oracle Exadata.  Larry Ellison announced that this partnership will ensure that there will be out of the box integration of...

Executive View

Executive View: Intel Expressway API Manager - 70642

With the Expressway API Manager, Intel is attempting to define a new category of platform. It refers to this new platform as a “Composite Platform” designed to expose APIs to business partners and internal or external developers. The Expressway API Manager platform has a strong set of API management capabilities including developer on-boarding and lifecycle management, integration, routing, data protection, mobile-middleware, and security. The platform consists of an on-premise gateway and SaaS developer portal. Both components are available directly from Intel. The SaaS...

Blog

What happened recently in Security?

The big topic clearly is what Edward Snowden unveiled: The PRISM program and some other nation-state activities on the Internet. In fact, this did not really come as a surprise. There have been discussions and rumors about such activities (and others) for many, many years. Maybe it helps driving forward risk- and information-centric security concepts and end-to-end-security instead of investing in point solutions. I will cover that topic in another blog post soon. Facebook again struggles with privacy However, besides PRISM etc. there have been various other security-related incidents and...

Executive View

Executive View: HP Virtual Private Cloud – Security and Assurance- 70739

The HP Virtual Private Cloud Service offering from HP Enterprise Services is one of the members of the HP Converged Cloud Strategy within the HP Managed Cloud Service Offering family.  This provides everything needed to run applications and to access them securely over a network.  This executive view provides an overview of these services focused on their security and assurance aspects...

Webinar

Jul 09, 2013: PRISM: Wie schütze ich mein Unternehmen wirksam vor Wirtschaftsspionage?

Das organisierte und systematische Ausspionieren von Privatpersonen und Unternehmen durch staatliche Einrichtungen ist zwar nicht neu und keineswegs auf US-Einrichtungen beschränkt. Aber es ist durch die jüngsten Enthüllungen in Zusammenhang mit dem PRISM Projekt der US-Sicherheitsbehörde NSA einmal mehr in unser Bewußtsein gerückt, dass wir durch solche Übergriffe verwundbarer geworden sind und der anrichtbare Schaden nicht selten existenzbedrohliche Ausmaße annimmt. In diesem Webinar gibt Ihnen KuppingerCole Gründer Martin Kuppinger Empfehlungen, wie Sie Ihre wirklichen Gefahren erkennen...

Webcast

European Identity & Cloud Awards 2013: Lifetime Achievement Award

This year, the “Lifetime Achievement” award has been presented again, and this time it went to Kim Cameron, who has greatly contributed to the Identity Management field with his “Seven Laws of Identity” and who continues to shape the IAM field with new ideas.

Webinar

Jul 23, 2013: The Future of Authentication and Authorization

Clearly, there is a trend towards approaches for strong, simple, and flexible authentication, beyond passwords. However, just talking about multi-factor authentication and password vaults is not sufficient. What organizations should evaluate are versatile authentication and, as the next and logical step, context- and risk-based authentication and authorization. That is the real trend. In this webinar, KuppingerCole Senior Analyst Dave Kearns will talk about the bigger picture on the future of authentication and authorization.

Blog

What do you mean by that?

One of my favorite passages from Lewis Carroll is the dialog in "Through the Looking Glass" between Alice and Humpty Dumpty: "There's glory for you!" "I don't know what you mean by 'glory,' " Alice said. Humpty Dumpty smiled contemptuously. "Of course you don't — till I tell you. I meant 'there's a nice knock-down argument for you!' " "But 'glory' doesn't mean 'a nice knock-down argument,' " Alice objected. "When I use a word," Humpty Dumpty said, in rather a scornful tone, "it means just what I choose it to mean — neither more nor less." "The question is," said Alice, "whether you can...

Webinar

Jul 03, 2013: Cloud Assurance & Cloud Risk Awareness in the Light of PRISM

With the recent unveiling of systematic and large scale espionage activities conducted by US government agencies, the level of trust into cloud services run and controlled by 3rd parties has reached a new low. Google, Facebook, Skype, Apple, Verizon and many other service providers did open their databases to NSA and enabled them to search your mails and documents for information considered as valuable in whatever context. In this webinar, KuppingerCole´s Senior Analyst Mike Small will give you an introduction on how to identify the key assurance challenges of the different kinds of Cloud...

Executive View

Executive View: Amazon Web Services – Security and Assurance - 70779

Amazon Web Services (AWS) provides computing infrastructure that enables organizations to obtain computing power, storage, and other on-demand services in the cloud.  This executive view provides an overview of these services focused on their security and assurance aspects...

Executive View

Executive View: IBM Security Intelligence with Big Data - 70743

Detecting and managing covert attacks on IT systems is becoming a serious problem.  Cyber criminals are using increasingly sophisticated techniques to infiltrate organizational IT systems to commit crimes including data theft, denial of service and blackmail.  IBM Security Intelligence with Big Data is a set of products and services that are intended to respond to these challenges. 

Blog

Is the cloud really a "honeypot" for PRISM?

Revelations in the last week around PRISM have shocked many and it is forcing many of us to re-evaluate our position towards providers of cloud services. I don't really believe that it comes as a shock to anyone, that various US Agencies have the ability, nor do I believe that anyone could have doubted that they are actively using that ability to intercept internet traffic and scan it for threats to National Security. What I find shocking is the possible extent of the monitoring and the way it has been done. To me at least an important question has to be asked in the wake of these...

Executive View

Executive View: Omada Identity Management Suite - 70783

Omada, a Danish vendor started as supplier of advanced Identity and Access Management capabilities in year 2000. Today Omada has, in addition to its IAM capabilities, established itself as a vendor for IAG (Identity and Access Governance), providing compliance, overview and control across multiple platforms. The company has grown through the last decade from providing IAM solutions through Microsoft’s FIM Synchronization Engine for customers primarily with a Microsoft and/or SAP infrastructure to where they are today, supporting role management, flexible workflow processes,...

Webcast

Marcel van Galen - Qiy Foundation´s Infrastructure

Session at the European Identity & Cloud Conference 2013

May 16, 2013 17:00

Webcast

James Baker, William Lovegrove - Architecture and functionality of the "EIC App"

Session at the European Identity & Cloud Conference 2013

May 16, 2013 16:30

Webcast

Panel Discussion - From Risk to Value: The Future of Social Media and their Role as Catalysts in Enterprise IAM

Session at the European Identity & Cloud Conference 2013

May 16, 2013 15:30

Webcast

Nadya Onishchenko - Secure Communication Ecosystem as Part of the Life Management Infrastructure

Session at the European Identity & Cloud Conference 2013

May 16, 2013 15:00

Webcast

Mario Hoffmann - Roadmap to Life Management Platforms

Session at the European Identity & Cloud Conference 2013

May 16, 2013 14:30

Webcast

Mike Small - Top Ten Tips for Negotiating and Assuring Cloud Services

Session at the European Identity & Cloud Conference 2013

May 16, 2013 17:00

Webcast

Mark Evans - The Reason why RLB Moved to the Cloud

Session at the European Identity & Cloud Conference 2013

May 16, 2013 15:30

Webcast

Nikita Reva - Fast Tracking your Risk Strategy for the Cloud

Session at the European Identity & Cloud Conference 2013

May 16, 2013 15:00

Webcast

Wolfgang Schmidt - Compliance in Hybrid Clouds: Integrated Process Management Despite Regulatory Requirements?

Session at the European Identity & Cloud Conference 2013

May 16, 2013 14:30

Webcast

Dr. Karsten Kinast, LL.M. - Big Data – Small Privacy?

Session at the European Identity & Cloud Conference 2013

May 16, 2013 12:00

Webcast

Martin Kuppinger - Big Data done right: Smart Data. Why the API Economy and Life Management Platforms will drive Big Data to the next Level

Session at the European Identity & Cloud Conference 2013

May 16, 2013 11:00

Webcast

Prof. Dr. Sachar Paulus, Mike Small - Big Data: the Need, the Opportunities

Session at the European Identity & Cloud Conference 2013

May 16, 2013 10:30

Webcast

Mike Small - Information Stewardship: What does it mean for Big Data?

Session at the European Identity & Cloud Conference 2013

May 16, 2013 11:30

Webcast

Quo Vadis SAP?

KuppingerCole Webinar recording

Webcast

Marcel van Galen - Qiy Independent Trust Framework

Session at the European Identity & Cloud Conference 2013

May 15, 2013 15:30

Webcast

Jörg Heuer - The Wallet and Life Management

Session at the European Identity & Cloud Conference 2013

May 15, 2013 15:00

Webcast

OASIS Panel - ID Protocols: Out with the Old and in with the New?

Session at the European Identity & Cloud Conference 2013

May 15, 2013 14:00

Webcast

Panel Discussion - Next Generation Cloud and Mobile Identity Management

Session at the European Identity & Cloud Conference 2013

May 15, 2013 10:30

Webcast

Panel Discussion - EU´s General Data Protection Regulation: 10 uneasy Truths for any Business

Session at the European Identity & Cloud Conference 2013

May 15, 2013 11:30

Webcast

Panel Discussion - Access Risk Management: Continuously Identifiying and Tracking Access Risks

Session at the European Identity & Cloud Conference 2013

May 15, 2013 17:00

Webcast

Daniel Frei - Risk-based Access Management @Swiss Re

Session at the European Identity & Cloud Conference 2013

May 15, 2013 15:30

Webcast

Panel Discussion - Access Intelligence: The New Standard Feature of Access Governance?

Session at the European Identity & Cloud Conference 2013

May 15, 2013 15:00

Webcast

Ulrich Haumann - IAM Governance Outside IT

Session at the European Identity & Cloud Conference 2013

May 15, 2013 14:30

Webcast

Dr. Carsten Mielke - A Success Story Introducing User Access Management for an Energy Trading Company

Session at the European Identity & Cloud Conference 2013

May 15, 2013 14:00

Webcast

Panel Discussion - Access Governance: How to Govern all Access

Session at the European Identity & Cloud Conference 2013

May 15, 2013 12:00

Webcast

Martin Kuppinger - Redefining Access Governance: Going well beyond Recertification

Session at the European Identity & Cloud Conference 2013

May 15, 2013 11:30

Blog

IBM acquires SoftLayer

On June 24th, IBM announced that it is to acquire SoftLayer Technologies Inc. and at the same time announced the formation of a new Cloud Services division. Following the close of this acquisition the new division will combine SoftLayer with IBM SmartCloud into a global platform. So what is special about SoftLayer, why is this important and what does it mean? SoftLayer Technologies Inc., which was founded in 2005, has over 100,000 devices under management which makes it one of the largest privately held computing infrastructure providers in the world.  SoftLayer has redefined the delivery...

Webcast

Prof. Dr. Sachar Paulus - Software Integrity and Active Defense: The Future of Information Security

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

Prof. Dr. Kai Rannenberg - Can “App” Phones Help Users to Manage their Identity and Privacy?

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

Ralf Knöringer - ONE Identity – Heaven or Hell? Do we need more than one “ME”?

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

Peter Boyle - If Your Customers Don´t Feel Safe, They Will Leave You

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

European Identity & Cloud Awards 2013

The European Identity Awards honor projects that promote the awareness for and business value of professional Identity Management and Cloud Security.

May 15, 2013 at Munich, Germany

Webcast

Craig Burton - Life Management Platforms Evolution

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

Marcel van Galen - Life Management Platforms: Examples, Prototypes, Best Practices

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

Doc Searls - The Internet of Me and My Things

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

Dr. Karsten Kinast, LL.M. - Post-Privacy: Yet to come or has it already arrived?

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

Prof. Dr. Reinhard Posch - European Cloud Partnership: Shaping a Competitive Strategy

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

Jonathan Cogley - Don’t Let Password Mismanagement Land Your Company in News Headlines

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

Peter Weierich - Consumer IAM: Business Drivers and Challenges

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

Dr. Laurent Liscia - You can Shelve your Big Data Startup Plans if you don´t have Privacy Covered: A Standards Perspective

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

Kim Cameron - Tackling the Identity Explosion: Getting a grip on Customers and Partners

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

Dr. Wojciech Wiewiórowski - Personal Data Protection and eID: Bringing two Reforms of EU Legislation to a Common Denominator

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

Hila Meller - The Day After Tomorrow: Security Challenges of the Future

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

Philip Lieberman - Securing Privileged Identities in the Real World: A Proposed Maturity Model of Competence and Capabilities

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Blog

The evidence is growing, passwords are dead

Whenever I talk about passwords these days, or rather the need to end the use of passwords, I really feel I should call myself Cassandra. In Greek mythology, Cassandra was the daughter of King Priam and Queen Hecuba of Troy. Her beauty caused Apollo to grant her the gift of prophecy. When Cassandra refused Apollo's attempted seduction, he placed a curse on her so that her predictions and those of all her descendants would not be believed. In the understanding of some modernists, Cassandra’s prophecies were flawed and incapable of coming true. But to the ancients (and in the sense I use it)...

Webcast

Alessandro Musumeci - Moving to the Cloud to Improve Customer Experience: Lessons Learnt

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

Karl Markgraf - Compliance Driven Identity & Access Governance

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

Pamela Dingle - Analog Identity

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

Jackson Shaw - Mortality & Morbidity Findings for Identity Management

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

Panel Discussion - The Future of IAM

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Webcast

Martin Kuppinger - EIC 2013 Opening Keynote

Keynote at the European Identity & Cloud Conference 2013

May 14-17, 2013 at Munich, Germany

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]